Podcast Episodes
Back to SearchA reel disaster for GitHub.
Season 10 Episode 2266
A phishing campaign targets nearly 12,000 GitHub repositories. The BlackLock ransomware group is one to watch. A federal judge orders reinstatement o…
11 months, 3 weeks ago
Ingrid Toppelberg: Knowing how to take risks will pay off. [Cybersecurity education] [Career Notes]
Season 2 Episode 59
Please enjoy this encore of Career Notes.
Chief Product Officer at Cybint Solutions, Ingrid Toppelberg, shares her journey from consulting to bootcamp…
11 months, 3 weeks ago
Trailblazers in Cybersecurity: Lessons from the Women Leading the Charge
Season 5 Episode 58
We thought you might enjoy this episode of Threat Vector podcast from the N2K CyberWIre network as we continue our observance of Women's History Mont…
11 months, 3 weeks ago
The ransomware clones of HellCat & Morpheus. [Research Saturday]
Season 9 Episode 369
Jim Walter, Senior Threat Researcher on SentinelLabs research team, to discuss their work on "HellCat and Morpheus | Two Brands, One Payload as Ranso…
11 months, 3 weeks ago
Balancing budget cuts and cybersecurity.
Season 10 Episode 2265
The White House is urging federal agencies not to lay off cybersecurity teams. Google doesn’t deny receiving a secret legal order from the UK governm…
11 months, 3 weeks ago
FCC draws the line on Chinese tech threats.
Season 10 Episode 2264
The FCC looks to counter Chinese cyber threats. Turmoil at CISA. Volt Typhoon infiltrated a power utility for over 300 days. Europe takes the lead at…
11 months, 3 weeks ago
Will Plankey lead CISA to victory?
Season 10 Episode 2263
The White House names their nominee for CISA’s top spot. Patch Tuesday updates. Apple issues emergency updates for a zero-day WebKit vulnerability. R…
11 months, 3 weeks ago
X marks the hack.
Season 10 Episode 2262
X-Twitter had multiple waves of outages yesterday. Signal’s president warns against agentic AI. A new lawsuit alleges DOGE bypassed critical security…
11 months, 3 weeks ago
software bill of materials (SBOM) (noun) [Word Notes]
Season 2 Episode 74
Please enjoy this encore of Word Notes.
A formal record containing the details and supply chain relationships of various components used in building …
11 months, 3 weeks ago
PHP flaw sparks global attack wave.
Season 10 Episode 2261
PHP exploits are active in the wild. Security researchers discover undocumented commands in a popular Wi-Fi and Bluetooth-enabled microcontroller. Th…
1 year ago